0xRick / c2Links
A basic c2 / agent.
☆120Updated 5 years ago
Alternatives and similar repositories for c2
Users that are interested in c2 are comparing it to the libraries listed below
Sorting:
- ☆166Updated 2 years ago
- ☆208Updated 3 months ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 3 years ago
- ☆133Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆148Updated 2 years ago
- A C2 framework for initial access in Go☆189Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆336Updated last year
- ☆84Updated 3 years ago
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆206Updated 2 years ago
- ☆113Updated 3 years ago
- A collection of Cobalt Strike Aggressor scripts.☆102Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆188Updated 3 weeks ago
- ☆169Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 3 years ago
- Shellcode launcher for AV bypass☆217Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆141Updated 2 years ago
- The Official Sliver Armory☆114Updated 4 months ago
- Native Syscalls Shellcode Injector☆266Updated 2 years ago
- An open-source process injection enumeration tool written in C#☆172Updated 2 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆258Updated 2 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆253Updated 2 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆223Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆269Updated 2 years ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆192Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆161Updated 8 months ago
- ☆249Updated 2 years ago
- A variety of AV evasion techniques written in C# for practice.☆95Updated 4 years ago
- ☆306Updated 2 years ago
- Malicious Shortcut(.lnk) Generator☆198Updated 6 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆198Updated 3 years ago